Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying

This manual will give you the incognito tools that'll make you a master of anonymity! Other books tell you to install Tor and then encrypt your hard drive...and leave it at that. I go much deeper, delving into the very engine of ultimate network security, taking it to an art form where you'll grow a new darknet persona - how to be anonymous online without looking like you're trying to be anonymous online.

Linux for Beginners: An Introduction to the Linux Operating System and Command Line

Knowing where to start when learning a new skill can be a challenge, especially when the topic seems so vast. There can be so much information available that you can't even decide where to start. Or worse, you start down the path of learning and quickly discover too many concepts, commands, and nuances that aren't explained. What you learn in Linux for Beginners applies to any Linux environment including Ubuntu, Debian, Linux Mint, RedHat, Fedora, OpenSUSE, Slackware, and more.

Darknet: A Beginner's Guide to Staying Anonymous Online

Want to surf the web anonymously? This audiobook is the perfect guide for anyone who wants to cloak their online activities. Whether you're on Usenet, Facebook, P2P, or browsing the web with standard browsers like Opera, Firefox, and Internet Explorer, I will show you how to become a ghost on the internet, leaving no tracks back to your isp, or anyone else.

Schneier on Security

Presenting invaluable advice from the world's most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay - figuratively and literally - when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machines, ID cards, cameras, passwords, Internet banking, sporting events, computers, and castles, this book is a must-read for anyone who values security at any level - business, technical, or personal.

Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage

As the digital era becomes increasingly pervasive, the intertwining forces of computers and espionage are reshaping the entire world; what was once the preserve of a few intelligence agencies now affects us all. Corera's compelling narrative takes us from the Second World War through the Cold War and the birth of the Internet to the present era of hackers and surveillance. The book is rich with historical detail and characters as well as astonishing revelations about espionage carried out in recent times by the United Kingdom, the United States, and China.

Treading on Python is designed to bring developers and others who are anxious to learn Python up to speed quickly. Not only does it teach the basics of syntax, but it condenses years of experience. You will learn warts, gotchas, best practices, and hints that have been gleaned through the years--in just days.

The Age of Cryptocurrency: How Bitcoin and Digital Money Are Challenging the Global Economic Order

Bitcoin became a buzzword overnight. A cyber enigma with an enthusiastic following, it pops up in headlines and fuels endless media debate. You can apparently use it to buy anything from coffee to cars, yet few people seem truly to understand what it is. This raises the question: Why should anyone care about bitcoin? In The Age of Cryptocurrency, Wall Street journalists Paul Vigna and Michael J. Casey deliver the definitive answer to this question.

Data and Goliath: The Hidden Battles to Capture Your Data and Control Your World

In Data and Goliath, Schneier reveals the full extent of surveillance, censorship, and propaganda in society today, examining the risks of cybercrime, cyberterrorism, and cyberwar. He shares technological, legal, and social solutions that can help shape a more equal, private, and secure world. This is an audiobook to which everyone with an Internet connection - or bank account or smart device or car, for that matter - needs to listen.

Quantum Theory: A Very Short Introduction

Quantum theory is the most revolutionary discovery in physics since Newton. This book gives a lucid, exciting, and accessible account of the surprising and counterintuitive ideas that shape our understanding of the sub-atomic world. It does not disguise the problems of interpretation that still remain unsettled 75 years after the initial discoveries. The main text makes no use of equations, but there is a Mathematical Appendix for those desiring stronger fare.

Intermediate Python: Treading on Python, Book 2

Python is easy to learn. You can learn the basics in a day and be productive with it, but there are more-advanced constructs that you will eventually run across if you spend enough time with it. These constructs, while not necessary per se, allow you to be more succinct, to re-use code, and to think about code in a different way. In this audiobook, you will learn how the constructs work and when to use them, receive real-life examples from the standard library, and more. Write Python like the masters.

Hackers: Heroes of the Computer Revolution: 25th Anniversary Edition

Steven Levy's classic book traces the exploits of the computer revolution's original hackers - those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.

We live in the age of the algorithm. Increasingly the decisions that affect our lives - where we go to school, whether we get a car loan, how much we pay for health insurance - are being made not by humans but by mathematical models. In theory this should lead to greater fairness. But as Cathy O'Neil reveals in this urgent and necessary book, the opposite is true. Tracing the arc of a person's life, O'Neil exposes the black-box models that shape our future, both as individuals and as a society.

CompTIA Security+ (SY0-201) Lecture Series

Security+ (SY0-201) Lecture Series audio training is a fresh, intuitive way for IT professionals to get the training they need for their career. Security+ Lecture Series provides authentic, instructor-led lessons on the most essential topics covered in the CompTIA Security+ (SY0-201) exam. A passing score on the (SY0-201) exam is required for the Security+ certification, and this Lecture Series audio training helps you pass the exam quickly and easily.

Cybersecurity and Cyberwar: What Everyone Needs to Know

In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....

Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare

Cyberspace is the 21st century’s greatest engine of change. Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more.

Mathematics: A Very Short Introduction

The aim of this audiobook is to explain, carefully but not technically, the differences between advanced, research-level mathematics, and the sort of mathematics we learn at school. The most fundamental differences are philosophical, and listeners of this audiobook will emerge with a clearer understanding of paradoxical-sounding concepts such as infinity, curved space, and imaginary numbers. The first few chapters are about general aspects of mathematical thought.

CompTIA Network+ (N10-004) Lecture Series

Network+ (N10-004) Lecture Series audio training gives IT professionals a fresh, effective new way to train for the CompTIA Network+ certification. Network+ Lecture Series provides authentic, instructor-led lessons on the most essential topics covered in the CompTIA Network+ (N10-004) exam. A passing score on the (N10-004) exam is required for the Network+ certification, and this Lecture Series audio training helps you pass the exam quickly and easily.

The Dark Side of the Hacking World: What You Need to Know to Guard Your Precious Assets and Remain Safe

Hackers have always been a closed, secretive circle, wary of infiltrators and keeping their secrets completely hidden from the public eye until now! This book blows the lid open on the dark side of the hacking world, bringing all of the shadowy secrets, tools of the trade, malicious methods, and high-stakes multi-millionaire lifestyles of hackers out into the open! Each chapter gives you unprecedented access to the cunning tricks, psychological manipulation, and malware that hackers could be using against you right now!

Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World

The technology likely to have the greatest impact on the future of the world economy has arrived, and it's not self-driving cars, solar energy, or artificial intelligence. It's called the blockchain. The first generation of the digital revolution brought us the Internet of information. The second generation - powered by blockchain technology - is bringing us the Internet of value: a new, distributed platform that can help us reshape the world of business and transform the old order of human affairs for the better.

Hacking: Ultimate Hacking for Beginners, How to Hack

So you want to be a hacker? You want to know how to get into a system and look like a genius while you spot system vulnerabilities. In this world, you can either be a good hacker or a bad hacker. Whichever that is totally depends on your choice. This audiobook teaches ethical hacking and guides anyone interested to an in-depth discussion about what hacking is all about. This book also provides the right hacking mindset that will turn you into a trustworthy hacker.

How to Disappear: Erase Your Digital Footprint, Leave False Trails, and Vanish Without a Trace

Written by the world's leading experts on finding people and helping people avoid being found, How to Disappear covers everything from tools for disappearing to discovering and eliminating the nearly invisible tracks and clues we tend to leave wherever we go. Learn the three keys to disappearing, all about your electronic footprints, the dangers and opportunities of social networking sites, and how to disappear from a stalker.

Publisher's Summary

This book is a clear and informative introduction to cryptography and data protection - subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are highlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce. This book highlights the explosive impact of cryptography on modern society, with, for example, the evolution of the Internet and the introduction of more sophisticated banking methods.

This is a textbook, written as dryly as most textbooks are. Good for someone interested in a degree in cryptography, but very boring for the casual listener. Quite a bit of the text describes written exercises that don't lend themselves to listening. From now on, I will not take audibles recommendations without researching potential titles on my own.

Computer Programmer and Worship Leader. Have enjoyed reading since my mom got me hooked on Nancy Drew and Agatha Christie prior to my teen years. My brother got me hooked on audio books after I started having a longer commute to work.
Love a variety of genres.

First a few thoughts: (1) This is a textbook, and unless you are interested in the subject matter, you will probably not enjoy the book, (2) Don't think about listening to the book without the attached PDF Files - you'll be very lost (3) This is a book that probably needs some amount of review as you move along.

I enjoyed the book, but I do agree it was very dry at times. When I first bought the book, Audible did not have the PDF's available. I tried to listen to it then and was unable to get very far into the book without being lost. I was also probably at an advantage, as I have read books on espionage and was familiar with some basic "encryption" techniques.

After Audible posted the content, I started again, and things made more sense.

I would recommend this book, but ONLY if you have a pretty good working knowledge of computers and are willing to put more time into it that reading an average book.

context , folks like Brain Green or Linda Randall to name but one example show how complex subjects can be shared via audio by using the context to convey the message. this is missing very much, despite the fascinating subject

Would you ever listen to anything by Fred Piper and Sean Murphy again?